Skip to content

Commit

Permalink
Add additional principal types to role assignment resource
Browse files Browse the repository at this point in the history
  • Loading branch information
williamoconnorme committed Jan 30, 2025
1 parent 4e5117d commit 7a82f11
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 1 deletion.
2 changes: 2 additions & 0 deletions internal/services/authorization/role_assignment_resource.go
Original file line number Diff line number Diff line change
Expand Up @@ -111,6 +111,8 @@ func resourceArmRoleAssignment() *pluginsdk.Resource {
"User",
"Group",
"ServicePrincipal",
"Device",
"ForeignGroup",
}, false),
},

Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/role_assignment.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -187,7 +187,7 @@ The following arguments are supported:

~> **NOTE:** The Principal ID is also known as the Object ID (ie not the "Application ID" for applications).

* `principal_type` - (Optional) The type of the `principal_id`. Possible values are `User`, `Group` and `ServicePrincipal`. Changing this forces a new resource to be created. It is necessary to explicitly set this attribute when creating role assignments if the principal creating the assignment is constrained by ABAC rules that filters on the PrincipalType attribute.
* `principal_type` - (Optional) The type of the `principal_id`. Possible values are `User`, `Group`, `ServicePrincipal`, `Device` and `ForeignGroup`. Changing this forces a new resource to be created. It is necessary to explicitly set this attribute when creating role assignments if the principal creating the assignment is constrained by ABAC rules that filters on the PrincipalType attribute.

~> **NOTE:** If one of `condition` or `condition_version` is set both fields must be present.

Expand Down

0 comments on commit 7a82f11

Please sign in to comment.